Author of the publication

A Fault Attack Against the FOX Cipher Family.

, , and . FDTC, volume 4236 of Lecture Notes in Computer Science, page 98-105. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An evaluation of an AES implementation protected against EM analysis., , , , and . ACM Great Lakes Symposium on VLSI, page 317-318. ACM, (2013)A Direct Mapping of Algorithms onto VLSI Processing Arrays Based on the Data Flow Approach., and . ICPP, page 335-337. IEEE Computer Society, (1983)Does the Floorplan of a Chip Affect Its Yield?, and . DFT, page 159-166. IEEE Computer Society, (1993)Hybrid Signed-Digit Number Systems: A Unified Framework for Redundant Number Representations With Bounded Carry Propagation Chains., and . IEEE Trans. Computers, 43 (8): 880-891 (1994)Low Cost Dynamic Architecture Adaptation Schemes for Drowsy Cache Management., , and . J. Low Power Electron., 9 (4): 373-388 (2013)The Effect of Operation Scheduling on the Performance of a Data Flow Computer., , and . IEEE Trans. Computers, 36 (9): 1019-1029 (1987)Countermeasures against EM analysis for a secured FPGA-based AES implementation., , , , and . ReConFig, page 1-6. IEEE, (2013)A unified approach to a class of number systems., and . IEEE Symposium on Computer Arithmetic, page 25-28. IEEE Computer Society, (1978)Dependence of SEUs in Digital Cameras on Pixel size and Elevation., , , , and . DFT, page 1-4. IEEE, (2021)Do more camera pixels result in a better picture?, , and . IOLTS, page 73-78. IEEE Computer Society, (2012)